The Oft Transparent Link in Cyber Security’s Risk Chain — People!

This is Part Five of a Six-Part blog series on Cyber Risk Management from guest blogger Simon Goldstein. Too often cyber security, and related risk management, is viewed as a purely technological matter pertaining only to the processes and practices reliant upon IT assets, systems, partners and services. Reality is quite different.  Cyber Security is[…]

The Seven Performance Steps to Managing Risk, the NIST Way

This is Part Four of a Six-Part blog series on Cyber Risk Management from guest blogger Simon Goldstein. Every approach to risk management, cyber-oriented, operational, IT, financial, and so on covers the core basics NIST describes as Identify, Protect, Detect, Respond, and Recover.  And there are also many ways to describe the performance operations needed[…]

What Senior Execs Need to Know about their Cyber Risk Program

This is Part Three of a Six-Part blog series on Cyber Risk Management from guest blogger Simon Goldstein Senior Executives perform an important role in any effective cyber risk and security program. They are the executors of the governance function. They provide direction, resources, and policy leadership. They are neither a rubber stamp, nor simply[…]

How Technology Enables Enterprise Risk Management

This is the final blog of a four-part series on ERM from guest blogger Michael Rasmussen of GRC 20/20 Research.   Risk management fails when information is scattered, redundant, non-reliable, and managed as a system of parts that do not integrate and work as a collective whole. The risk management information architecture supports the process architecture[…]

The Evolution Of GRC As Compliance And Risk Management Become More Complex

The core functionality of GRC has evolved in response to the need for a standardized and centralized data and process management structure supporting compliance and risk management functions in light of increasing complexity in both activities. As GRC further evolves into an enterprise platform, these capabilities cease to be solution differentiators, although they are no[…]

The Configurability of Workflows With GRC

The Configurability of Workflow In some cases, these capabilities represent very basic, generic understandings of a workflow in the abstract that do not match the specific processes of the organization in question. Even in tools focused on a specific function or application of GRC, the workflows used by the solution may not match the individual[…]

A Director’s View Of Risk: Opportunities For True Enterprise GRC

The increased complexity and stakes of risk and compliance have resulted in strengthened demand for an understanding of the risks that face an organization. While this raises the profile of compliance and risk management with corporate leadership, it also presents new challenges. Few directors or senior executives outside of risk and compliance management have in-depth[…]

Top

DoubleCheck ERM One™

An out-of-the-box tool that delivers an integrated ERM process together with a comprehensive, high-level categorization of exposures (Financial, Core Business, Operational and Strategic), fully loaded with over 60 associated, pre-populated risks to be used as a starting point.

X